Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for configuring security options in a computer system

a technology of security options and computer systems, applied in the field of computer security systems, can solve the problems of restricting in-band communication, presenting technologists with some challenging obstacles, and the sheer scope of modern computer networks

Inactive Publication Date: 2003-12-04
HEWLETT PACKARD DEV CO LP
View PDF6 Cites 118 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not surprisingly, the evolution of networked computing has presented technologists with some challenging obstacles along the way.
One obstacle is the sheer scope of modern computer networks.
Practically speaking, this limitation restricts in-band communication to times when the OS of the managed server is operational (online).
Regardless of whether the remote computer is communicating with the server to manage it or to carry out some other function, such as web serving, file sharing, device sharing, etc., security may be a very important issue.
Prevention of access by unauthorized external devices may be particularly problematic if the internal system is configured for remote access via a publicly accessible network, such as the Internet.
Remote access can be problematic, particularly when authentication and access control are required.
Unfortunately, network administrators must maintain these lists on multiple systems, and users often must keep track of separate accounts and passwords.
Thus, this type of system is both time consuming and difficult to manage.
However, in the United States, they have not been widely deployed for various reasons.
For example, companies have appeared reluctant to utilize smartcard technology due to the expense of retrofitting existing computers with smartcard readers.
Even with the use of passwords, personal identification numbers, and smartcards, a system is still only able to authenticate a computer and not a person because anyone who can guess or steal a user's password, personal identification number, and / or smartcard can digitally sign electronic documents and access data in that user's name.
Barring a malfunction or bodily mutilation, an authorized user always has a "key" or "password," and unauthorized users cannot easily come into possession of it.
Thus, biometrics solves the problems of authorized users who may have forgotten their password, as well as unauthorized users that may have come into possession of the password.
Unfortunately, like smartcard technology, companies have been reluctant to embrace biometrics due to the expense of retrofitting existing computers with biometric scanners.
Finally, this situation is potentially even more problematic if the system administrator attempts to access the server from a remote terminal located outside of work, such as at home or while traveling.
However, because such an access is attempted from a location not directly affiliated with the business, there can be no assurances of the actual identity of the user absent rigorous authentication.
Even with rigorous user authentication, greater restrictions may be placed on the same user when accessing the system remotely as opposed to accessing the system at work or directly from a secure facility.
Furthermore, in the case of remote operation, even if the identity of the user can be determined with absolute certainty, some operations may be inherently more problematic because the user is not physically close to the work group using the server and may not know about a problem the user causes while remotely accessing the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for configuring security options in a computer system
  • Method and apparatus for configuring security options in a computer system
  • Method and apparatus for configuring security options in a computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following patents or patent applications are hereby incorporated by reference:

[0029] U.S. Pat. No. 5,898,861, entitled "Transparent Keyboard Hot Plug" by Theodore F. Emerson, Jeoff M. Krontz and Dayang Dai;

[0030] U.S. Pat. No. 5,790,895, entitled "Modem Sharing" by Theodore F. Emerson and Jeoff M. Krontz;

[0031] U.S. patent application Ser. No. 08 / 733,254, entitled "Video Eavesdropping and Reverse Assembly to Transmit Video Action to a Remote Console" by Theodore F. Emerson, Peter J. Michaels and Jeoff M. Krontz, filed Oct. 18, 1996; and

[0032] U.S. patent application Ser. No. 09 / 438,253, entitled "Operating System Independent Method and Apparatus for Graphical Remote Access" by Theodore F. Emerson and Wesley Ellinger, filed Nov. 12, 1999.

[0033] One or more specific embodiments of the present invention will be described below. In an effort to provide a concise description of these embodiments, not all features of an actual implementation are described in the specification. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system includes different authentication levels and / or different privileges based on certain criteria. For example, if a user's identity can be somewhat assured due to the directness of the connection, authentication may be less rigorous than in a situation where the connection is more remote, thus making the user's identity less assured. Also, a user's privileges may be restricted if the user accesses the system from a remote location or during non-business hours.

Description

[0001] 1. Field of the Invention[0002] This invention relates generally to computer security systems and, more particularly, to a technique for providing user profiles.[0003] 2. Background of the Related Art[0004] This section is intended to introduce the reader to various aspects of art which may be related to various aspects of the present invention which are described and / or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.[0005] Since the introduction of the first personal computer ("PC") over 20 years ago, technological advances to make PCs more useful have continued at an amazing rate. Microprocessors that control PCs have become faster and faster, with operational speeds eclipsing the gigahertz (one billion ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
CPCG06F2221/2113G06F21/305
Inventor NEUFELD, E. DAVIDDONALDSON, GINA
Owner HEWLETT PACKARD DEV CO LP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products